Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.
Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
Ideal for conference and event planners, independent planners, associations, event management companies, non-profits, and more.
YesEvents offers a comprehensive suite of services that spans the entire conference lifecycle and ensures every detail is executed with precision. Our commitment to exceptional customer service extends beyond conventional boundaries, consistently exceeding expectations and enriching both organizer and attendee experiences.
WARNING: Project moved to http://github.com/plashchynski/viewssld viewssld is a free and open source non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort and other Network IntrusionDetection Systems (IDS).
serverM is an extremely flexible signature-based host-based intrusiondetection system (HIDS). Running as a Perl daemon, it uses little CPU, and is capable of detecting a wide range of intrusions. Signature language is powerful and alarm options varied.
Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusiondetection or malware removal.
Evolia makes it easier to hire, schedule and track time worked by frontline in medium and large-sized businesses.
Evolia is a web and mobile platform that connects enterprises with 1000’s of local shift workers and offers free workforce scheduling and time and attendance solutions. Is your business on Evolia?
devialog is a behavior/anomaly-based syslog intrusiondetection system which detects unknown attacks via anomalies in syslog. It can generate signatures for ease of management, act upon anomalies in a predefined fashion or perform as a standard log parser
Paranoid Panda is an IntrusionDetection System that works with Growl( a notification system for Mac os X). The program sends an alert to the screen when a new user logs into your system or logs out. Designed with wifi hacker defense in mind.
Trinux is a small ramdisk/floppy based Linux distribution that contains useful tools for mapping and monitoring TCP/IP networks (i.e. intrusiondetection and vulnerability scanning)
GNUWire is a centrally managed, multi threaded file integrity checker / intrusiondetection tool. It was written from the ground up with security, portability, scalability, performance and user interface in mind.
This is a Host based IntrusionDetection system, it consists of 4 components viz.Port scan detector,Policy Enforcer,Network Statistics,and Vulnerability detector. The backend programs are written in C, the front end is made using Qt Designer and Glade.
As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
This project aims at developing a tool for tcpdump traffic traces anonymization (useful for network monitoring and IntrusionDetection Systems), in order to preserve privacy.
PyIDS is an intrusiondetection system whose aim is to provide concise information to administrators about some parts of the system i.e filesystem checksums, unknown connections to the machine, access control lists of special files, log revision...
Secwatch is an intrusiondetection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
EIS is an Intrusiondetection system that gathers local "client" accounting information, compares it to known vulnerabilities and notifies the appropriate people when there is a comprimise in security.
The Bro Re-usable Architecture (BRA) is a project by Christopher Jay Manders that will allow one, with minimal effort, to set up a working Bro (real-time intrusiondetection) environment.
SnortSnarf is a script to take alerts from the Snort IntrusionDetection System , and produce HTML output. This script can be run at regular intervals to produce a convenient HTML breakout of all the alerts.
Ida, is a Apache log security analyzer written in PHP. It will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on.
PSeudo terminal IntrusionDetection System.
The kernel part plugs into terminal processing subsystem and logs hashed terminal lines.
The user part reads these, consults a list of allowed entries, and takes appropriate action upon unexpected lines.
wIDSard is an host based IntrusionDetection System.
It intercepts syscalls made by the process to monitor at user level
by the ptrace mechanism. It can detect not only single system calls, but even
sequences, ripetition, negation ecc.
IASON is designed to analyze DNS, log files and data streams. IASON works in conjunction with a network firewall and IDS (IntrusionDetection System) software to block attacks while allowing legitimate requests to reach a domain name server.
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: IntrusionDetection Systems (sensors), Attacks, and Responses.